[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v7 34/36] x86/mm: Add support to encrypt the kernel in-place
On Fri, Jun 23, 2017 at 12:44:46PM -0500, Tom Lendacky wrote: > Normally the __p4d() macro would be used and that would be ok whether > CONFIG_X86_5LEVEL is defined or not. But since __p4d() is part of the > paravirt ops path I have to use native_make_p4d(). So __p4d is in !CONFIG_PARAVIRT path. Regardless, we use the native_* variants in generic code to mean, not paravirt. Just define it in a separate patch like the rest of the p4* machinery and use it in your code. Sooner or later someone else will need it. > True, 5-level will only be turned on for specific hardware which is why > I originally had this as only 4-level pagetables. But in a comment from > you back on the v5 version you said it needed to support 5-level. I > guess we should have discussed this more, AFAIR, I said something along the lines of "what about 5-level page tables?" and whether we care. > but I also thought that should our hardware ever support 5-level > paging in the future then this would be good to go. There it is :-) > The macros work great if you are not running identity mapped. You could > use p*d_offset() to move easily through the tables, but those functions > use __va() to generate table virtual addresses. I've seen where > boot/compressed/pagetable.c #defines __va() to work with identity mapped > pages but that would only work if I create a separate file just for this > function. > > Given when this occurs it's very similar to what __startup_64() does in > regards to the IS_ENABLED(CONFIG_X86_5LEVEL) checks. Ok. -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |